Computer
viruses were written and released by American fridkoen on November 10, 1983, to
test computer security. Now, more than 20 years later, there are more than
60,000 types of computer viruses in the world. These viruses are everywhere and
everywhere like ghosts, posing a great threat to the information security of
computers. For example, when the "shock wave" virus entered the world
nine years ago, if there was a flaw in the computer system, it would be
automatically searched by the "shock wave" virus, and the computer
would be guided to download the virus files through the network. If users of
these computers do not install patches, they are more likely to be infected
with the virus when connected to the Internet, and the entire infection process
does not require any human manipulation. The virus causes the "security
subsystem" process to crash, causing the system to reboot repeatedly and
causing serious errors in the running of security-related programs.

Now,
the computer virus is also evolving with the progress of science and
technology. It has become a powerful tool to attack the network instead of a
simple prank program. It poses a great security threat to the network. Tens of
thousands of new viruses are being created. Viruses can now cause unimaginable
disasters to individuals or businesses by automatically searching for
vulnerabilities in Web sites, chat tools, email systems, and corporate
networks.

Computer
viruses, like other normal process, is an executable program, but only run on a
computer, a computer virus is destructive, and its attached to other legal
procedures, is not a complete program, so it has a right to all other
procedures, and legal procedures for the control system of power. That is to
say, the control of computer CPU is the key issue. Once a computer virus runs
on it, it is highly likely to cause a system crash, which in turn can cause a
computer system crash.

Computer
viruses are as infectious as biological viruses. Computer viruses can spread
from infected computers to uninfected ones through various channels such as
E-mail and chat. Once a computer is infected with the virus and is not
processed in a timely manner, the virus can infect a large number of executable
files in the computer by rapidly replicating. These infected files can act as a
new medium to continue to infect new, uninfected devices while they exchange
data with other devices. A well-crafted computer virus program has excellent
latency. Some well - crafted viruses can only be detected by a professional
test program. During concealment it can be quietly transmitted to other systems
without being detected. Its infectivity is strong and weak and its harmfulness
is closely related to its hiding time in the computer. Most of the time when a
computer is infected with a virus, it can run normally, without the user
feeling abnormal. Most viruses are designed to be very short code to be better
hidden. Viruses typically have only a few hundred B's or 1KB, and PC access to
DOS files can be more than a few hundred KB per second, so the virus instantly
attaches those few hundred bytes to normal programs, making it hard to detect.
Because of this invisibility, computer viruses can infect any computer without
being detected by the user. A virus invasion into a computer is bound to pose a
threat to system resources, especially computer viruses spread through the
network, which can paralyze the whole system in a very short period of time,
thus causing great losses. Therefore, it is more necessary to protect against
virus invasion than to eliminate virus invasion.

Do
well the following protection measures to prevent the virus invasion has a
certain role.

Keep
an eye on the door. Many viruses are often hidden in the pirated disks, which
may lead to virus invasion in the process of copying the data with the disks
containing viruses. Therefore, anti-virus software must be used to scan the
viruses when using the disks, and the "entrance" of the computers
should be closed.

The
process that USES computer at ordinary times, want to develop a good habit,
accomplish to use antivirus software to check and kill a virus regularly,
install the firewall of authentic edition and antivirus software, upgrade to
newest version in time. This is a good defense against viruses lurking in
computers.

Carefully
log into an unknown website. The browser security level will be raised, do not
open the unknown email or the unknown website.

Keep
the operating system separate, and keep important data, files, etc. in
partitions outside the system, and make backups so that they can be recovered
in time after being infected by the virus.

Have
some basic knowledge of computer viruses so that when a computer is infected
with a virus, it will not become infected. Protect the virus from our
computers.